Author of the publication

An Efficient Method for Realizing Contractions of Access Structures in Cloud Storage.

, and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifiable local computation on distributed data., , and . SCC@ASIACCS, page 3-10. ACM, (2014)Two-Server Verifiable Homomorphic Secret Sharing for High-Degree Polynomials., and . ISC, volume 12472 of Lecture Notes in Computer Science, page 75-91. Springer, (2020)Privacy-Preserving and Publicly Verifiable Matrix Multiplication., and . IEEE Trans. Serv. Comput., 16 (3): 2059-2071 (May 2023)On the eigenvalues of certain matrices over Zm.. Discret. Math., 313 (7): 886-895 (2013)Post-Quantum Cheating Detectable Private Information Retrieval., , , and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 431-448. Springer, (2022)Two-Server Private Information Retrieval with Result Verification., and . ISIT, page 408-413. IEEE, (2022)Verifiable Delegation of Computations with Storage-Verification Trade-off., and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 112-129. Springer, (2014)Batch Verifiable Computation of Polynomials on Outsourced Data., and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 167-185. Springer, (2015)Privately Outsourcing Polynomial Evaluations and Matrix Multiplications using Multilinear Maps., and . CoRR, (2013)On the Modulus in Matching Vector Codes., , and . Comput. J., 65 (12): 2991-2997 (2022)